The document defines authorization as specifying access rights and privileges to resources related to information security. It discusses how authorization works by defining access policies for users or systems to access specific resources. The document also differentiates between authentication, which verifies a user's identity, and authorization, which verifies a user's access rights. It then provides an overview of how the OAuth protocol allows websites to authorize access to user accounts on other sites without sharing login credentials. Credit card authorization is described as approval from the card issuer that a customer has sufficient funds for a transaction, placing a hold on those funds.